Published inLevel Up CodingBinary Number Shifting and MultiplicationThe mathematics behind why shifting a number results in multiplicationMay 27May 27
Published inLevel Up CodingHow PKCE Works Part 2How PKCE works in Identity Server when running as an IdPFeb 12Feb 12
Published inLevel Up CodingSimulating an Authorization Code Injection AttackHow an Authorization Code Injection Attack Works in OIDCJan 8Jan 8
Published inLevel Up CodingHow PKCE Works Part 1How PKCE works in Identity Server when running as a clientDec 4, 2023Dec 4, 2023
How To Implement Step-up AuthenticationImplement step-up auth using Okta and Identity ServerOct 23, 2023Oct 23, 2023
Published inLevel Up CodingBe Careful Running Multiple Localhost AppsHow to run a localhost app using 127.0.0.1 and the issues you can have if you don’tOct 14, 20232Oct 14, 20232
Published inLevel Up CodingHow To Debug Identity ServerLearn how Duende Identity Server works behind the scenesOct 14, 2023Oct 14, 2023
Published inLevel Up CodingTroubleshooting CORS ErrorsA deep dive into how settings in Azure can CORS errorsFeb 26, 2022Feb 26, 2022
Published inLevel Up CodingHow Browsers Verify Digital Certificates — Part 2How signature verification works at a low levelFeb 12, 2022Feb 12, 2022
Published inLevel Up CodingHow Browsers Verify Digital Certificates — Part 1How signature verification works at a low levelFeb 12, 2022Feb 12, 2022